A Study of Black Hole Attack Solutions - 1st Edition - ISBN: 9780128053676, 9780128053799

A Study of Black Hole Attack Solutions

1st Edition

On AODV Routing Protocol in MANET

Authors: Elahe Fazeldehkordi Iraj Sadegh Amiri Oluwatobi Ayodeji Akanbi
eBook ISBN: 9780128053799
Paperback ISBN: 9780128053676
Imprint: Syngress
Published Date: 3rd November 2015
Page Count: 122
Tax/VAT will be calculated at check-out Price includes VAT (GST)
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
30% off
30% off
30% off
30% off
30% off
20% off
20% off
50.95
35.66
35.66
35.66
35.66
35.66
40.76
40.76
42.99
30.09
30.09
30.09
30.09
30.09
34.39
34.39
69.95
48.97
48.97
48.97
48.97
48.97
55.96
55.96
Unavailable
Price includes VAT (GST)
× DRM-Free

Easy - Download and start reading immediately. There’s no activation process to access eBooks; all eBooks are fully searchable, and enabled for copying, pasting, and printing.

Flexible - Read on multiple operating systems and devices. Easily read eBooks on smart phones, computers, or any eBook readers, including Kindle.

Open - Buy once, receive and download all available eBook formats, including PDF, EPUB, and Mobi (for Kindle).

Institutional Access

Secure Checkout

Personal information is secured with SSL technology.

Free Shipping

Free global shipping
No minimum order.

Description

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Key Features

  • Elaborates on the basics of wireless networks, MANETs
  • Explains the significance behind the need of wireless networks and MANET security
  • Understand MANET routing protocols, namely the ADOV method

Readership

Information security researchers, professionals and consultants, hackers and penetration testers, as well as high-level undergrad and post-graduate students.

Table of Contents

  • List of Tables
  • List of Figures
  • Preface
  • Chapter 1. Introduction
    • Abstract
    • 1.1 Introduction
    • 1.2 Problem Background
    • 1.3 Problem Statement
    • 1.4 Intent of Study
    • 1.5 Aims
    • 1.6 Scope
    • 1.7 The Significance of the Book
    • 1.8 Organization of the Book
  • Chapter 2. Literature Review
    • Abstract
    • 2.1 Introduction
    • 2.2 Network
    • 2.3 Wired Networks
    • 2.4 Why Wireless Networks?
    • 2.5 Wireless Networks
    • 2.6 Ad Hoc Networks
    • 2.7 Routing
    • 2.8 Ad Hoc Network Routing Protocols
    • 2.9 MANETs Routing Protocols
    • 2.10 Optimized Link State Routing Protocol (OLSR)
    • 2.11 Ad Hoc on Demand Distance Vector Routing Protocol (AODV)
    • 2.12 Dynamic Source Routing Protocol (DSR)
    • 2.13 Security Challenges in MANETs
    • 2.14 Related Studies
    • 2.15 Investigated Solutions
    • 2.16 Intrusion Detection System (IDSAODV)
    • 2.17 Evaluation Metrics
    • 2.18 Summary
  • Chapter 3. Research Methodology
    • Abstract
    • 3.1 Introduction
    • 3.2 Research Structure
    • 3.3 Summary
  • Chapter 4. Investigation and Selection Procedure
    • Abstract
    • 4.1 Introduction
    • 4.2 Executing a New Routing Protocol in NS to Simulate Black Hole Behavior
    • 4.3 Examining the Black Hole AODV
    • 4.4 Simulation of Black Hole Attack
    • 4.5 Summary
  • Chapter 5. Solution Execution and Result
    • Abstract
    • 5.1 Introduction
    • 5.2 An Outline of Investigation
    • 5.3 Execution of the Solution in NS-2
    • 5.4 Testing the IDSAODV
    • 5.5 Simulation of IDSAODV and Appraisal of Results
    • 5.6 Summary
  • Chapter 6. Conclusion and Future Work
    • Abstract
    • 6.1 Overview
    • 6.2 Contribution
    • 6.3 Future Work
  • References
  • Appendix A. Blackholeaodv TCL File
  • Appendix B. Trace File Example

Details

No. of pages:
122
Language:
English
Copyright:
© Syngress 2016
Published:
Imprint:
Syngress
eBook ISBN:
9780128053799
Paperback ISBN:
9780128053676

About the Author

Elahe Fazeldehkordi

E. Fazeldehkordi received her Associate’s Degree in Computer Hardware from the University of Science and Technology, Tehran, Iran, B. Sc (Electrical Engineering-Electronics) from Azad University of Tafresh, Iran, and M. Sc. in Information Security from Universiti Teknologi Malaysia (UTM). She currently conducts research in information security and has recently published her research on Mobile Ad Hoc Network Security using CreateSpace.

Affiliations and Expertise

B. Sc (Electrical Engineering Electronics), M. Sc (Information Security)

Iraj Sadegh Amiri

Dr. Iraj Sadegh Amiri received his B. Sc (Applied Physics) from Public University of Urmia, Iran in 2001 and a gold medalist M. Sc. in optics from University Technology Malaysia (UTM), in 2009. He was awarded a PhD degree in photonics in Jan 2014. He has published well over 350 academic publications since the 2012s in optical soliton communications, laser physics, photonics, optics and nanotechnology engineering. Currently he is a senior lecturer in University of Malaysia (UM), Kuala Lumpur, Malaysia.

Affiliations and Expertise

B. Sc in Applied Physics (Urmia University, Iran), M. Sc in Optics and Optoelectronics (University Technology Malaysia (UTM)), PhD in Photonics (University Technology Malaysia (UTM)), Postdoctoral Researcher in Experimental Physics and Photonics (University of Malaya (UM)), Senior Lecturer in Experimental Physics and Photonics (University of Malaya (UM))

Oluwatobi Ayodeji Akanbi

O.A. Akanbi received his B. Sc. (Hons, Information Technology – Software Engineering) from Kuala Lumpur Metropolitan University, Malaysia, M. Sc. in Information Security from University Teknologi Malaysia (UTM), and he is presently a graduate student in Computer Science at Texas Tech University His area of research is in CyberSecurity.

Affiliations and Expertise

B. Sc (Information Technology – Software Engineering), M. Sc (Information Security)